26: /// - Unless, that is, TLS-PSK, the Secure Remote Password (SRP) protocol, or some other protocol is used that can provide strong mutual authentication in the absence of certificates.

27: /// - In practice, you will hash the message beforehand (with hash algorithm such as MD5 or SHA1), obtaining the hashed message M1. Then you will encrypt M1 with your private key K0, digitally signing your message, and, finally, you will send your message M, the encrypted hash M1 (the signature) and the public key K1 to your recipient. Your recipient will compute the hash of your message M and will compare it with the decrypted value of M1. If the two hashes matches, the signature is valid.

28: /// - Launch the command "certmgr.msc" in Windows Start/Start Search to open the Certificate Manager.

29: /// - Double click a certifical file *.pfx to import it into the certificate store and you can use its public keys

34: /// The other party should have a "public key certificate" that I import into my certificate store

35: ///

36: /// Import a Certificate:

37: /// - You should only import certificates obtained from trusted sources. Importing an unreliable certificate could compromise the security of any system component that uses the imported certificate.

38: /// - You can import a certificate into any logical or physical store. In most cases, you will import certificates into the Personal store or the Trusted Root Certification Authorities store, depending on whether the certificate is intended for you or if it is a root CA certificate.

98: // now a signature can be performed. To do so, the SignData method of the privateKey object can be used. It accepts, as input, (1) the data to sign, as array of bytes, and (2) the object that represents the hash algorithm to use:

99: buffer = Encoding.Default.GetBytes(data);

100:

101: signature = privateKey.SignData(buffer, new SHA1Managed());

102:

103: // signature can also be verified. To do so you must utilize the public key of the certificate.

270: // now a signature can be performed. To do so, the SignData method of the privateKey object can be used. It accepts, as input, (1) the data to sign, as array of bytes, and (2) the object that represents the hash algorithm to use:

Authentication (Ia.Cl.Model):
Manage and verify user logging and passwords. The administrator will define the user's password and logging website. The service will issue a true of false according to authentication.